Tech Expo 2018 Booking

PERTH: Advanced Threats: What, Where, Why, How and Who

Dates

Tuesday, 24 July 2018
5:00pm to 7:30pm

Outlook Calendar To add this event to your Outlook calendar
please click here.

Location

Fraser Suites
10 Adelaide Terrace Perth
PERTH  WA  6000

Parking Info: Street parking near the venue is available. Also parking behind the Hyatt Regency on Terrace Road

 Existing IICA Member? Login below for Quick Registration 

Member No


retrieve password

Password  

Contact

Cassandra Brennan
Email: wa@iica.org.au
Phone: 0402 845 459 

Event Fee

Members - $0.00 inc GST
Guests - $25.00 inc GST
Student (non member) - $10.00 inc GST
Administration Only - $0.00 inc GST

   

Info

Presenter -Thomas Jriege, Focus Cyber Group

You should attend if you

>are responsible for your company's IT
>want to find out more about solutions to this growing threat - no business is too small


With the announcement of Meltdown & Spectre and previous malware infections such as WannaCry and Petya, attacking a single system at a time is no longer the status quo.

With current patching attempts against Meltdown & Spectre malware, new vulnerabilities keep getting introduced on top of the existing ones. With the dawn of Windows 10, Microsoft has introduced a more tedious and somewhat risky method of patching Operational Technology (OT) environments in the default configuration.

Traditionally, engineers could configure patching for manual intervention and control. Windows 10 in itself, in a default configuration, is a new threat to OT systems and introduces further risk to these digital environments.

Advanced threat actors will exploit vulnerabilities in the digital environment to compromise the confidentiality, integrity and availability of multiple applications in the organisation at once and use this information to craft more extensive and more sophisticated attacks against your digital environment.

Advanced threats, advanced persistent threats and sophisticated attacks are terms used to describe attacks launched against Information and Operational Technology environments where the threat actor/s carrying out the attack are highly motivated and the attacks used are highly sophisticated to infiltrate and compromise an organisations information and data assets.

Along with the malware attacks, the notoriously discussed insider threat, whether malicious or not, is a critical threat to your digital ecosystem. These insider threats play a significant role in these sophisticated attacks being successful. How well do you know the people in your organisation? Stuxnet was a great example of this. The presentation will take you on a journey to discuss these advanced threats, what they are and what you can do to mitigate these risks from arising from these advanced threats in your digital environment. No solution is perfect, but every little bit helps.

 

 

   

Event Flyers

 Information Flyer  | PDF Document | Filesize: 262 kB